A testament to our commitment to providing exceptional service, Codero was recently honored with the prestigious 2016 Best Uptime Guarantee industry award from HostingAdvice. Reliability is a mission-critical feature in hosting, and for providers that means uptime. Coupled with our tireless efforts ... Read more

Is your host lazy? Here’s your 5 signs. Bandwidth and disk space are only a couple of critical decisions to be made when deciding on the ideal hosting partner. Simply put, hosting has many moving parts, and they all need to work ... Read more

There are many discussions in recent events regarding the threat of vulnerable IoT devices. Part of the scare here is the ability of nefarious actors to unleash these devices in controlled botnets in strategic Denial of Service attacks. This is a very ... Read more

Hybrid cloud adoption is up from 58% to 71% year-over-year, according to the RightScale 2016 State of the Cloud Report. There’s ample evidence that hybrid cloud will be the platform of choice for enterprises in the near future because of the wide ... Read more

> data security

Posts Tagged ‘data security’

Let’s look at how you might select hosting options based on the factors that matter most to your business. Of course, none of these factors exist in a vacuum. In reality, the wisest choice for your business will be one that strikes the best balance for your unique needs. The X-Factor: Performance Here, we’re talking about server hardware and storage features, such as CPUs, RAM, storage type, etc. Performance considerations also include issues like bandwidth, availability, and network latency — all of which will affect… Read More

Rural Telecom Magazine decided to highlight the need for cloud and hosting solutions in rural areas. Please review the article published in this month's publication in which they highlighted Codero CEO, Emil Sayegh, to discuss the technology challenges and the available solutions. Rural Telecom is published by NTCA–The Rural Broadband Association six times a year. BRINGING THE CLOUD TO RURAL FARMS AND BUSINESSES Public health, education, high-tech farming and agriculture, seismic data collection, oil exploration and production, clean energy generation and management, transportation and disaster management are examples of… Read More

Distributed Denial of Service (DDoS) attacks aren’t infamous for their sophistication; however, they’re increasing adaptability warrants a fresh look at the evolving anatomy of these dynamic threats. What is a DDoS attack? A DDoS attack is an attempt to consume one or more finite resources on a target computer or network of computers. These attack vectors block genuine users from accessing the network, application, or service and exploit detectable vulnerabilities. What are the types of DDoS attacks? Although there is a broad spectrum of types… Read More

The evolution of technology has fundamentally changed the security landscape. The trench warfare style of a static frontline for computer security has given way to guerilla warfare. In the past few weeks alone, we’ve seen the Glibc vulnerability and the DROWN SSL vulnerability. Cybersecurity risks pose increased threat to your business, which can be subjected to significant liabilities if your network falls victim to a cyber-related attack. Safeguard your environment and your business by reviewing the five actions crucial for preparedness: identify, protect, detect, respond,… Read More

Today, researchers from a number of universities and organizations around the world announced the DROWN SSL exploit. DROWN, an acronym standing for Decrypting RSA with Obsolete and Weakened eNcryption, is an exploit that allows for remote decryption of SSL communications even if they’re protected by more advanced cipher suites. DROWN was assigned CVE CVE-2016-0800. Read a detailed analysis and fix to this vulnerability at DROWNattack.com Who is Affected? Anyone who uses SSL for any services including, but not limited to, HTTPS or IMAPS should assume… Read More

The Vulnerability: Recently, security researchers working for Google and Red Hat announced a vulnerability in a library commonly used in Linux environments. Specifically, Glibc getaddrinfo() is susceptible, under certain conditions, to a stack-based buffer overflow attack while performing DNS queries. This vulnerability has been designated CVE-2015-7547. Who is Affected? Any server running Linux with glibc 2.9 or later is affected.A complete list of the linux distributions affected can be found on the nixCraft community site. What do I need to do? If you are a Proactive Managed customer, we… Read More

If you’re running a server or desktop with Linux Kernel 3.8 or higher, you and your website or application are vulnerable to a very serious 0-day local privilege escalation vulnerability. Millions of Linux systems around the world are vulnerable to compromise and must be patched. What Damage Can the Linux Vulnerability Cause? This bug (referred to as CVE-2016-0728) affects the keyrings facility in the kernel, allowing the kernel to cache security data, authentication keys, and other sensitive data. The bug creates a leak in the… Read More